Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Backdoor file detection method and backdoor file detection device

A detection method and backdoor technology, which is applied in the field of network security, can solve problems such as prone to misjudgment and inaccurate backdoor files, and achieve the effect of protection security and high detection accuracy

Active Publication Date: 2018-07-24
ALIBABA GRP HLDG LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a detection method and device for backdoor files to solve the problems in the prior art of identifying backdoor files such as backdoor files that are not accurate enough and prone to misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Backdoor file detection method and backdoor file detection device
  • Backdoor file detection method and backdoor file detection device
  • Backdoor file detection method and backdoor file detection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.

[0031] It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be call...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a backdoor file detection method and a backdoor file detection device, and the method may comprise the following steps: acquiring website logs aiming at access records of a file; extracting submitted data in the website logs; detecting whether the file is a suspicious backdoor file based on the submitted data, and when the file is the suspicious backdoor file, determining whether the suspicious backdoor file is a backdoor file based on the submitted data. Through the technical scheme provided by the invention, the backdoor file can be identified accurately, and securityof a website can be guaranteed.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a detection method and device for a backdoor file. Background technique [0002] Web shell (website backdoor) files are also called webpage backdoor files, which are usually written in the same programming language as the website language. After hackers invade a website, they usually put the backdoor files in a hidden directory to achieve control Purpose of the Site. [0003] In the prior art, in order to prevent the backdoor file uploaded to the website from being discovered and used by other hackers, the hacker will write an identity verification program in the backdoor file, then the hacker who accesses the backdoor file must enter the correct password, and the backdoor file will be Execute the real backdoor code. There are more full-featured webpage Trojan horses that appear at present, that is, Trojan horses with common functions of hackers such as direc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1433H04L63/145
Inventor 李相垚
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products